SlideShare a Scribd company logo
Impact of centralized state power
Governments role in WWII
WWII starts ,[object Object],[object Object],[object Object]
Japanese relocation camps ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cold war conflict
The arms race ,[object Object],[object Object]
North American Treaty Organization (NATO) ,[object Object],[object Object]
NATO, meet Warsaw pact. ,[object Object],[object Object],[object Object]
Civil rights movement
Resistance as usual   ,[object Object],[object Object],[object Object]
Government solutions to the rescue! ,[object Object],[object Object],[object Object],[object Object]
Even more trouble… ,[object Object],[object Object]
Birmingham attacks
 
The government is getting somewhere with this desegregation. ,[object Object],[object Object]
Reagan's presidency
Saving money  ,[object Object],[object Object],[object Object],[object Object]
Bibliography ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Causes of the Civil War: Sectionalism & States' Rights
Causes of the Civil War: Sectionalism & States' RightsCauses of the Civil War: Sectionalism & States' Rights
Causes of the Civil War: Sectionalism & States' Rightsmsdean28
 
The 1980s
The 1980sThe 1980s
The 1980s
Kelly Milkowich
 
Chapter 17 Pretest
Chapter 17 PretestChapter 17 Pretest
Chapter 17 Pretestjbeneigh
 
The North Takes Charge
The North Takes ChargeThe North Takes Charge
The North Takes Charge
Matthew Caggia
 
Expansion in Texas
Expansion in TexasExpansion in Texas
Expansion in Texas
Matthew Caggia
 
Jefferson Alters the Nation's Course
Jefferson Alters the Nation's CourseJefferson Alters the Nation's Course
Jefferson Alters the Nation's Course
Matthew Caggia
 
Important Supreme Court Cases
Important Supreme Court CasesImportant Supreme Court Cases
Important Supreme Court Cases
Cory Plough
 
Vs7 review
Vs7 reviewVs7 review
Vs7 reviewsegrey
 
Truman Powerpoint
Truman PowerpointTruman Powerpoint
Truman Powerpoint
Nathan Tengowski
 
The Politics of War
The Politics of WarThe Politics of War
The Politics of War
Matthew Caggia
 
United States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 NotesUnited States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 Notesskorbar7
 
Module 8 notes
Module 8 notesModule 8 notes
Module 8 notes
leighlee218
 
Standard 10
Standard 10Standard 10
Standard 10
Taylor Stevens
 
Living in the Ike Age
Living in the Ike AgeLiving in the Ike Age
Living in the Ike Age
Spiro Bolos
 
The lasting effects of the civil war
The lasting effects of the civil warThe lasting effects of the civil war
The lasting effects of the civil war
Jacob Prince
 

What's hot (20)

The 1970s
The 1970sThe 1970s
The 1970s
 
Causes of the Civil War: Sectionalism & States' Rights
Causes of the Civil War: Sectionalism & States' RightsCauses of the Civil War: Sectionalism & States' Rights
Causes of the Civil War: Sectionalism & States' Rights
 
The 1980s
The 1980sThe 1980s
The 1980s
 
Chapter 17 Pretest
Chapter 17 PretestChapter 17 Pretest
Chapter 17 Pretest
 
The North Takes Charge
The North Takes ChargeThe North Takes Charge
The North Takes Charge
 
Expansion in Texas
Expansion in TexasExpansion in Texas
Expansion in Texas
 
Jefferson Alters the Nation's Course
Jefferson Alters the Nation's CourseJefferson Alters the Nation's Course
Jefferson Alters the Nation's Course
 
Truman-Domestic Policy
Truman-Domestic PolicyTruman-Domestic Policy
Truman-Domestic Policy
 
Important Supreme Court Cases
Important Supreme Court CasesImportant Supreme Court Cases
Important Supreme Court Cases
 
Vs7 review
Vs7 reviewVs7 review
Vs7 review
 
Truman Powerpoint
Truman PowerpointTruman Powerpoint
Truman Powerpoint
 
Sectionalism
SectionalismSectionalism
Sectionalism
 
The Politics of War
The Politics of WarThe Politics of War
The Politics of War
 
United States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 NotesUnited States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 Notes
 
Module 8 notes
Module 8 notesModule 8 notes
Module 8 notes
 
2nd Party System
2nd Party System2nd Party System
2nd Party System
 
Foreign Policy
Foreign PolicyForeign Policy
Foreign Policy
 
Standard 10
Standard 10Standard 10
Standard 10
 
Living in the Ike Age
Living in the Ike AgeLiving in the Ike Age
Living in the Ike Age
 
The lasting effects of the civil war
The lasting effects of the civil warThe lasting effects of the civil war
The lasting effects of the civil war
 

Similar to Impact Of Centralized State Power

Ch 25 The Sixties
Ch 25 The SixtiesCh 25 The Sixties
Ch 25 The SixtiesRick Fair
 
Drugan\'s Class- The Cold War
Drugan\'s Class- The  Cold  WarDrugan\'s Class- The  Cold  War
Drugan\'s Class- The Cold War
Kim Drugan
 
Early United States
Early United States Early United States
Early United States
Kris Hagans
 
Chapter 18 double v
Chapter 18 double vChapter 18 double v
Chapter 18 double v
alanjgamez
 
4e5abcReviewQuestions
4e5abcReviewQuestions4e5abcReviewQuestions
4e5abcReviewQuestionsErica Furlong
 
WWI - Over Here!
WWI - Over Here!WWI - Over Here!
WWI - Over Here!Melissa
 
Chapter 10 Notes
Chapter 10 NotesChapter 10 Notes
Chapter 10 Notesi Classroom
 
Midterm Review
Midterm ReviewMidterm Review
Midterm Reviewdficker
 
Why Were Northern Soldiers Eager to Fight to Preserve the Union?
Why Were Northern Soldiers Eager to Fight to Preserve the Union?Why Were Northern Soldiers Eager to Fight to Preserve the Union?
Why Were Northern Soldiers Eager to Fight to Preserve the Union?
Reflections on Morality, Philosophy, and History
 
Kennedy and johnson
Kennedy and johnsonKennedy and johnson
Kennedy and johnsonEmily Holmes
 
America rebirth and the emergency of modern america.docx
America rebirth and the emergency of modern america.docxAmerica rebirth and the emergency of modern america.docx
America rebirth and the emergency of modern america.docx
write22
 
BY THE MID 20TH CENTURY .docx
BY THE MID 20TH CENTURY                                     .docxBY THE MID 20TH CENTURY                                     .docx
BY THE MID 20TH CENTURY .docx
humphrieskalyn
 
U.s.history ch.2.
U.s.history ch.2.U.s.history ch.2.
U.s.history ch.2.
Oroville High School
 
Week 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docx
Week 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docxWeek 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docx
Week 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docx
cockekeshia
 
Emerging republic chs 8 9
Emerging republic chs 8   9Emerging republic chs 8   9
Emerging republic chs 8 9Andy Ligeti
 

Similar to Impact Of Centralized State Power (20)

The 1960s
The 1960sThe 1960s
The 1960s
 
Ch 25 The Sixties
Ch 25 The SixtiesCh 25 The Sixties
Ch 25 The Sixties
 
Drugan\'s Class- The Cold War
Drugan\'s Class- The  Cold  WarDrugan\'s Class- The  Cold  War
Drugan\'s Class- The Cold War
 
Early United States
Early United States Early United States
Early United States
 
Goal 8 -_ww_i
Goal 8 -_ww_iGoal 8 -_ww_i
Goal 8 -_ww_i
 
Chapter 18 double v
Chapter 18 double vChapter 18 double v
Chapter 18 double v
 
4e5abcReviewQuestions
4e5abcReviewQuestions4e5abcReviewQuestions
4e5abcReviewQuestions
 
The Eisenhower Years
The Eisenhower YearsThe Eisenhower Years
The Eisenhower Years
 
WWI - Over Here!
WWI - Over Here!WWI - Over Here!
WWI - Over Here!
 
Chapter 10 Notes
Chapter 10 NotesChapter 10 Notes
Chapter 10 Notes
 
Midterm Review
Midterm ReviewMidterm Review
Midterm Review
 
Why Were Northern Soldiers Eager to Fight to Preserve the Union?
Why Were Northern Soldiers Eager to Fight to Preserve the Union?Why Were Northern Soldiers Eager to Fight to Preserve the Union?
Why Were Northern Soldiers Eager to Fight to Preserve the Union?
 
Kennedy and johnson
Kennedy and johnsonKennedy and johnson
Kennedy and johnson
 
America rebirth and the emergency of modern america.docx
America rebirth and the emergency of modern america.docxAmerica rebirth and the emergency of modern america.docx
America rebirth and the emergency of modern america.docx
 
BY THE MID 20TH CENTURY .docx
BY THE MID 20TH CENTURY                                     .docxBY THE MID 20TH CENTURY                                     .docx
BY THE MID 20TH CENTURY .docx
 
U.s.history ch.2.
U.s.history ch.2.U.s.history ch.2.
U.s.history ch.2.
 
Week 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docx
Week 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docxWeek 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docx
Week 2.1 History 385 - !1Week 2.1 The Civil War and the Re.docx
 
Emerging republic chs 8 9
Emerging republic chs 8   9Emerging republic chs 8   9
Emerging republic chs 8 9
 
vvvv
vvvvvvvv
vvvv
 
Early republic part i
Early republic part iEarly republic part i
Early republic part i
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Impact Of Centralized State Power